Loading ...
  • Winner Digital Transformation Solutions
  • Recognized Leader in Cyber Security
  • Best Value for Tech Deployment & Project Management

Cyber Security Awareness for Executives

This training module is designed specifically for executives and senior managers of companies with responsibility for organizing the security of their company's IT systems.


DESCRIPTION 

This training module is designed specifically for executives and senior managers of companies who are responsible for organizing the security of their company's IT systems. Participants will explore the general security environment, security actors and components, threats, vulnerabilities and effective solution approaches to address the risks inherent in the cyber world. They will also have a better visibility on the perimeters and fields of application of the law in cybersecurity

DUREE 6 – 8 hours
HEARING
  • Leaders and senior managers of society
  • Business creators
PRE-REQUISITES : No
GOALS  

At the end of this module, participants will have a solid foundation in cybersecurity. The objectives of the training are::

  • Know and understand the challenges of cybersecurity
  • Understand the challenges of cybersecurity
  • Identify the legal risks around cybersecurity
  • Know and understand the main types of attacks and their consequences
  • Identify the protection tools
  • The phenomenon of cybersecurity today: definition, actors and components
  • The different profiles of the attackers: from the coder to the hacker
  • The different facets of cybersecurity: cyber espionage, cybercrime, cyber activism, cyber terrorism, cyber war in the service of governments
  • Cybersecurity from a legal point of view, the role of supervisory authorities, the role of specialized agencies
  • Cybersecurity from an organizational point of view, from a technical point of view, and from a human point of view (social engineering)
  • Risk management: definition of risk, definition of vulnerability, threat and impact. 
  • The risk management lifecycle: identification, assessment, treatment and response
  • Protection tools (Antivirus, antispyware, firewalls, probes)